{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T09:50:56Z","timestamp":1769161856501,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642290466","type":"print"},{"value":"9783642290473","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29047-3_8","type":"book-chapter","created":{"date-parts":[[2012,3,19]],"date-time":"2012-03-19T23:05:59Z","timestamp":1332198359000},"page":"61-68","source":"Crossref","is-referenced-by-count":4,"title":["Using Organizational Similarity to Identify Statistical Interactions for Improving Situational Awareness of CBRN Activities"],"prefix":"10.1007","author":[{"given":"David","family":"Melamed","sequence":"first","affiliation":[]},{"given":"Eric","family":"Schoon","sequence":"additional","affiliation":[]},{"given":"Ronald","family":"Breiger","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Asal","sequence":"additional","affiliation":[]},{"given":"R. Karl","family":"Rethemeyer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-19656-0_5","volume-title":"Social Computing and Behavioral Cultural Modeling and Prediction","author":"R.L. Breiger","year":"2011","unstructured":"Breiger, R.L., Ackerman, G., Asal, V.H., Melamed, D., Milward, H.B., Rethemeyer, R.K., Schoon, E.: Application of a Profile Similarity Methodology for Identifying Terrorist Groups that Use or Pursue CBRN Weapons. In: Salerno, J., Yang, S., Nau, D., Chai, S. (eds.) Social Computing and Behavioral Cultural Modeling and Prediction, pp. 26\u201333. Springer, New York (2011)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Melamed, D., Bregier, R.L., Schoon, E.: The Duality of Clusters and Stastical Interactions. Sociological Methods & Research\u00a041 (2012) (in press)","DOI":"10.1177\/0049124112464870"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1201\/9781420069679.ch13","volume-title":"Jihadists and Weapons of Mass Destruction","author":"V.H. Asal","year":"2009","unstructured":"Asal, V.H., Rethemeyer, R.K.: Islamist use and pursuit of CBRN terrorism. In: Ackerman, G., Tamsett, J. (eds.) Jihadists and Weapons of Mass Destruction, pp. 335\u2013358. CRC Press, Boca Raton (2009)"},{"key":"8_CR4","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7881.001.0001","volume-title":"Radical, Religious, and Violent: The New Economics of Terrorism","author":"E. Berman","year":"2009","unstructured":"Berman, E.: Radical, Religious, and Violent: The New Economics of Terrorism. The MIT Press, Cambridge (2009)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Berman, E., Laitin, D.D.: Religion, Terrorism and Public Goods: Testing the Club Model. Journal of Public Economics\u00a092 (2008)","DOI":"10.3386\/w13725"},{"key":"8_CR6","unstructured":"Breiger, R.L., Melamed, D., Schoon, E.: Report on a Profile Similarity Methodology for Turning Terrorist Attributes into Network Connections. Unpublished technical report"},{"key":"8_CR7","volume-title":"Regression Diagnostics: Identifying Influential Data and Sources of Collinearity","author":"D.A. Belsley","year":"2004","unstructured":"Belsley, D.A., Kuh, E., Welsch, R.E.: Regression Diagnostics: Identifying Influential Data and Sources of Collinearity. John Wiley, Hoboken (2004)"},{"key":"8_CR8","volume-title":"Applied Logistic Regression","author":"D. Hosmer","year":"2006","unstructured":"Hosmer, D., Lameshow, S.: Applied Logistic Regression, 2nd edn. Wiley, Hoboken (2006)","edition":"2"},{"key":"8_CR9","volume-title":"Foundations of Social Theory","author":"J. Coleman","year":"1990","unstructured":"Coleman, J.: Foundations of Social Theory. Harvard University Press, Cambridge (1990)"},{"key":"8_CR10","volume-title":"Human Groups and Social Categories","author":"H. Tajfel","year":"1981","unstructured":"Tajfel, H.: Human Groups and Social Categories. Cambridge University Press, Cambridge (1981)"}],"container-title":["Lecture Notes in Computer Science","Social Computing, Behavioral - Cultural Modeling and Prediction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29047-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:53:01Z","timestamp":1558299181000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29047-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290466","9783642290473"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29047-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}